Security is a major concern for Internet users and system administrators. Whether to protect confidential data and information in individual files, lock a computer system to unauthorised users, control access to an intranet or an extranet, or conduct business on the Internet, one need to determine an appropriate level of Internet Security Issues and the effective means to achieve the objectives. The threat to Internet security is one of the main barriers to electronic transaction via the Internet medium. With the current popularity and the potential profits of electronic business, many executives face a conflict situation.
That is, connecting to the Internet and expanding their business would lead to risks and threats of intrusion. On the other hand, remaining disconnected from the Internet would sacrifice their customer contact and services to their competitors. We still all needs to be concern with all matters related to internet security issues as it affects us all in some way or the other.
The Internet uses simple mail transfer protocol (SMTP) to transmit electronic mail and most business transactions. These transmissions have as much privacy as a postcard and travel over insecure, un-trusted lines. Anyone anywhere along the transmission path can obtain access to a message and read the contents with a simple text viewer or word processing program. Because the transmission lines are insecure, it is easy to forge e-mail or use another person’s name. Theft of identity is becoming the nation’s leading incidence of fraud. A person can even claim that someone else sent a message, for example, to cancel an order or avoid paying an invoice.
Organisations in both the public and the private sectors are aware of the needs of Internet security. It is interesting to know how both sectors take action to protect their Internet data and corporate systems. The best way to keep an intruder from entering the network is to provide a security wall between the intruder and the corporate network. Since the intruders enter the network through a software program, such as a virus or worm etc., or a direct connection, firewalls, data encryption, and user authentication can restrain a hacker to some extent.